Abishek Shah
IT Security Specialist / Cyber Security Engineer | Network Security Expert | Software Developer
Innovating IT security and emerging technologies for a safer digital world. Specializing in advanced cybersecurity solutions, AI-driven threat intelligence, secure infrastructure design, and comprehensive security frameworks with over 9 years of expertise.
About Me
IT Security Specialist & Cybersecurity Engineer with a passion for securing digital assets
IT Security Specialist with over 10 years of experience in securing digital assets
I'm Abishek Shah, an experienced IT professional with over 10 years of expertise in managing information systems and technology. Skilled in threat analysis, security operations, risk management, and data protection. A continuous learner with a strong background in software development, incident response, vulnerability assessment, and penetration testing.
I excel in designing and implementing security solutions, specializing in network and application security, cryptography, security compliance, and cloud security. I have a proven record of accomplishment of creating secure networks and systems to protect sensitive data, and I'm eager to contribute my skills as a Cybersecurity Specialist to enhance defenses against evolving threats and ensure data confidentiality and integrity.
Years Experience
Years of hands-on experience in IT security and cybersecurity engineering
Projects
Successful projects delivered across various industries and technologies
Certifications
Professional certifications in cybersecurity and IT management
Support
Dedicated support and commitment to client security needs
Skills & Expertise
My technical skills and areas of expertise in IT security and cybersecurity
Technical Security Skills
Software Development
Soft Skills
Security Frameworks & Compliance
Additional Technical Expertise
Security
- Firewalls & IDS/IPS
- SIEM Implementation
- Endpoint Security
- DevSecOps
- Security Automation
Infrastructure
- Network Infrastructure
- IPsec & VPN
- DNS Management
- Cloud Architecture
- Disaster Recovery
Management
- IT Project Management
- Change Management
- Strategic Planning
- Budgeting
- Team Leadership
Work Experience
My professional journey in IT security and cybersecurity
ICT Officer
Providing comprehensive IT support and managing cybersecurity initiatives for the organization.
Key Achievements:
- Provided comprehensive IT support to staff, volunteers and Executives managing support tickets and collaborating with IT service providers for efficient issue resolution
- Administered Microsoft 365 services (Azure AD, Exchange, Intune, Power Flows) and manage the inventory of software and hardware assets
- Contribute to the development and execution of security awareness training and helped in updating and implementing IT and cybersecurity policies
- Collaborated with stakeholders, MSP's and security vendors to ensure secure IT systems and projects, strengthening the organization's cybersecurity maturity
- Supported the installation, maintenance, and compliance of security applications, while overseeing the security and preventive maintenance of ICT systems (backups, recovery, integrity controls)
- Monitored system performance, propose enhancements, and provide insights to shape ICT strategies, policies, and long-term plans for organizational growth
Cyber Security Analyst
Conducting vulnerability assessments and implementing security frameworks to protect organizational data.
Key Achievements:
- Conducted thorough vulnerability assessments to identify and address system weaknesses, enhancing the overall security of company data
- Implemented and supported governance, risk, and compliance frameworks, ensuring strict adherence to security standards and regulatory requirements for robust cybersecurity
- Applied expertise in secure software development, enforcing coding principles aligned with the CISSP Domain 8 framework to enhance overall system security
- Monitored and analysed security logs and events, swiftly identifying, and responding to potential security threats, contributing to a fortified cybersecurity posture for the organization
- Provided continuous scrutiny of security logs, promptly responding to potential threats, thus bolstering the organization's resilience against cybersecurity challenges
Software Developer
Developing robust, scalable software solutions for SMEs as an independent contractor.
Key Achievements:
- Conducted thorough analysis and documentation of software requirements, aligning them with client business needs and implementing Software Development Life Cycle (SDLC), version control, and continuous integration/deployment through platforms such as Git, Docker, AWS, Azure, and Google Cloud
- Engineered robust, scalable, and user-friendly software solutions for SMEs, demonstrating proficiency in programming languages including Python, Java, PHP, C#, and ASP.NET, along with expertise in HTML/CSS
- Orchestrated front-end design with a focus on responsive design and cross-browser compatibility, utilizing technologies such as React, Angular, and Vue.js. Executed back-end development using Node.js, Django, ASP.NET, RESTful APIs, and microservices architecture for both desktop and mobile applications
- Crafted optimized relational databases to ensure best and responsive performance, leveraging expertise in SQL, MySQL, PostgreSQL, and NoSQL. Implemented UI/UX design principles, usability testing, wireframing, and prototyping
- Implemented a comprehensive software development approach, incorporating a variety of programming languages and technologies, to deliver tailored solutions that meet client requirements and industry standards
IT Analyst
Analyzed business requirements and managed IT infrastructure to support organizational goals.
Key Achievements:
- Conducted in-depth analysis of business requirements to identify opportunities for enhancing IT solutions and aligning them with organizational goals
- Oversaw the administration of Windows, file, and database servers, optimizing workflows through cloud platform utilisation for network, storage, and subsystems
- Managed the installation and configuration of servers, hardware, and peripherals, strictly adhering to standards and operational requirements for seamless integration
- Developed and supported the IT infrastructure, including Windows, VMWare, backup and recovery, security, and network components, ensuring alignment with organizational needs
- Implemented and supported the operational efficiency of Windows, VMWare, backup and recovery, security, and network components, contributing to a robust IT infrastructure aligned with organizational requirements
Information Technology Security Engineer
Designed and implemented comprehensive security frameworks to enhance cybersecurity posture.
Key Achievements:
- Designed and implemented a comprehensive security framework to enhance the organization's cybersecurity posture and mitigate potential threats, resulting in improved overall data protection
- Led a team in conducting a thorough security audit, finding, and addressing critical vulnerabilities in the network infrastructure, achieving a reduction in security risks, and ensuring compliance with industry standards
- Spearheaded the development of a robust incident response plan, significantly reducing the mean time to detect and respond to security incidents, enhancing the organization's resilience against cyber threats
- Implemented a proactive vulnerability management program, resulting in a decrease in the number of security vulnerabilities across the organization's systems and applications, strengthening the overall security posture
- Orchestrated and executed a company-wide security awareness training program, reducing the number of security breaches related to human error and fostering a security-conscious organizational culture
Featured Projects
A selection of my recent work in cybersecurity, software development, and research
SkyOS – Unified AI Operating System
Sky Nexus Australia • 2024
A unified AI operating system designed to integrate various AI capabilities into a cohesive platform for enhanced productivity and automation.
LegalTech - Transformation
Sky Nexus Australia • 2023
A comprehensive legal technology transformation project aimed at modernizing legal processes through technology integration.
Justice App – AI Law Analysis
Sky Nexus Australia • 2022
An AI-powered application for legal analysis, providing insights and assistance for legal professionals.
Structural Damage Detection using UAV and Neural Network
Victoria University • 2022
Application of UAV technology and neural networks for detecting structural damage in buildings and infrastructure.
Security Frameworks & Compliance
Expertise in implementing and maintaining compliance with industry-standard security frameworks
ASD Essential Eight
Australian government's cybersecurity framework with eight essential mitigation strategies.
ISO/IEC 27001
International standard for information security management systems (ISMS).
NIST CSF
National Institute of Standards and Technology Cybersecurity Framework.
APPs
Australian Privacy Principles for handling personal information.
GDPR
General Data Protection Regulation for data protection and privacy in the EU.
PCI DSS
Payment Card Industry Data Security Standard for handling credit card information.
HIPAA
Health Insurance Portability and Accountability Act for medical information privacy.
CIS Controls (v8)
Center for Internet Security Controls for effective cyber defense.
SOC 2
Service Organization Control 2 for managing customer data.
Achievements & Certifications
Professional achievements, certifications, and recognized expertise
ACS Certified ANZSCO Roles
ICT Project Manager
2023ANZSCO 135112
Australian Computer Society
ICT Managers (nec)
2023ANZSCO 135199
Australian Computer Society
ICT Security Specialist
2021ANZSCO 262112
Australian Computer Society
Key Impact Highlights
Reduced System Downtime
Reduced system downtime by 40% through proactive infrastructure monitoring, automated failover strategies, and streamlined disaster recovery planning.
Accelerated Incident Response
Accelerated incident response by 30% by integrating SIEM tools, refining escalation protocols, and enhancing log analysis capabilities.
Achieved Compliance
Achieved 95%+ compliance with ISO/IEC 27001 and ASD Essential Eight by enforcing policies, conducting regular internal audits, and rolling out security awareness programs.
Minimized Security Vulnerabilities
Minimized security vulnerabilities by 60% via continuous penetration testing, secure code practices, and a structured patch management process.
Lowered IT Operational Costs
Lowered IT operational costs by 25% through cloud migration, resource optimization, and the introduction of automation in key IT processes.
Community Involvement
My contributions to the community and volunteer experiences
Leadership Award | LEAD
Recognized for exceptional leadership skills and contributions to the university community.
Support Worker | Community Engagement
Provided support services and engaged with the community to promote equality and healthcare access.
Volunteer | Study NSW
Assisted international students arriving at Sydney Airport as part of the Study NSW program.
Volunteer | Nepal Earthquake Relief Program
Participated in relief efforts following the devastating earthquake in Nepal.
Volunteer | Balkhu Slum Settlement
Provided support and assistance to residents of the Balkhu Slum Settlement.
My Services
Comprehensive security solutions to protect your digital assets
Cybersecurity Consulting
Comprehensive security assessments, vulnerability management, and implementation of robust security controls to protect your digital assets.
Penetration Testing
Thorough security testing to identify vulnerabilities in your systems and applications before malicious actors can discover and exploit them.
Network Security
Design and implementation of secure network architectures, including firewalls, VPNs, and intrusion detection systems.
Cloud Security
Secure cloud infrastructure design, implementation, and management with focus on data protection and compliance.
Database Security
Protection of sensitive data through robust database security controls, encryption, and access management solutions.
Custom Software Development
Tailored software solutions designed with security in mind, addressing specific business challenges and enhancing operational efficiency.
Security Policy Development
Creation of comprehensive security policies, procedures, and guidelines aligned with industry standards and regulatory requirements.
Security Awareness Training
Customized training programs to educate your team on security best practices, threat recognition, and incident response.
Brand Design
Strategic brand identity development including logo design, color palettes, typography, and comprehensive brand guidelines to establish a strong market presence.
Digital Marketing
Comprehensive digital marketing strategies including social media, content marketing, email campaigns, and paid advertising to boost your online presence and drive growth.
SEO Optimization
Data-driven search engine optimization services to improve your website's visibility, increase organic traffic, and enhance your online presence through proven techniques.
Certifications & Courses
Professional certifications and continuous learning achievements
Network Security Associate
Certification in network security fundamentals and Fortinet security solutions.
Fortinet Certified in Cybersecurity
Comprehensive certification in cybersecurity principles and Fortinet security technologies.
Certified Information Systems Security Professional (CISSP)
Globally recognized certification for information security professionals.
Certified Ethical Hacker (CEH)
Certification for professionals skilled in identifying weaknesses in computer systems.
Offensive Security Certified Professional (OSCP)
Hands-on penetration testing certification demonstrating practical skills.
Professional Development
Continuous learning and professional growth initiatives
ECA Professional Year Program
A professional development program designed for international graduates in IT to enhance their skills and employability in the Australian job market.
Key Achievements:
- Completed 44 weeks of professional development training
- Developed advanced workplace communication and teamwork skills
- Gained practical experience through a 12-week internship
- Enhanced understanding of Australian workplace culture and practices
Advanced Cybersecurity Workshop Series
Intensive workshop series covering advanced topics in cybersecurity and emerging threats.
Key Achievements:
- Mastered advanced threat hunting techniques
- Developed skills in security automation and orchestration
- Completed hands-on labs in cloud security architecture
- Participated in collaborative red team exercises
Client Testimonials
What clients say about working with me
"Abishek's expertise in cybersecurity transformed our organization's security posture. His methodical approach to identifying vulnerabilities and implementing solutions was impressive."
Get In Touch
Have a question or want to work together? Reach out to me.
Contact Information
Availability
I'm currently available for freelance work, consulting, and full-time positions. Feel free to reach out to discuss how we can work together.
Send Me a Message
Ready to Secure Your Digital Assets?
Let's work together to protect your organization from cyber threats and build a robust security posture.